Security bloggers help keep you up to date on how to protect your network through news, updates, advice, and opinions on how you can stay ahead of hackers.

Understanding the enemy is an essential component of a successful defense. Like a general planning fortifications, a security manager must understand black hat tools and techniques and use this knowl...

In the past, a lost laptop automatically meant a compromise of whatever confidential data it contained. This is changing for the better, however. Paul Mah discusses the latest developments on the anti...

This week's security events include news of a security vulnerability found in MS SQL Server 2000, scammers exploiting older versions of Asterisk VoIP systems to make unauthorized calls, a project at G...

Well, now that CyberSpy Software doesn't promote RemoteSpy (a remote keylogger) as super-secret software and doesn't provide directions on how to use it as such, all is well in the legal realm. What a...

Google is becoming a major driver of network enabled application innovation and Web security research. Will its Native Client project be a game changing addition to available Internet technologies, o...

In this post, we'll walk through how Hamachi works, look at some additional free tools you can run over Hamachi connections, and the risk it presents to your business network. We'll close with a few ...

This week's security events include news of a security update for the popular Trillian instant messenger; the release for version 5.2.7 of PHP, which greatly improves stability and security; a vulnera...

Earlier this week, I ranted about schools and businesses not using controls to prevent students and employees from viewing unsuitable content on the Web. I thought it appropriate to discuss an easy-t...

Many businesses and home users have decided to skip Windows Vista and wait for Windows 7. Vista's security improvements have been only minor and incremental. Some fundamental changes need to be made t...

We need to look closely at conditions victimizing people in the wrong place at the wrong time. If it isn't a crime to use public ignorance of technology to shift responsibility for acts of cyber-negl...

This Memorial Day evening, let us consider the security not of our corporate networks, but of our country, and of the men and women who serve in its armed forces as the shield against foreign aggresso...